Filters








892 Hits in 1.3 sec

Fog Radio Access Networks with Hierarchical Content Delivery

Zhenyu Zhong, Jianmin Qin, Zeyu Zhong, Zhang Li
2019 IEEE Access  
Based on (36), with Assumption 1 and Assumption 3, C f b for the f -th file under the proposed hierarchical content delivery strategy is then given by k∈ a d P d ZHENYU ZHONG received the M.E. degree  ...  ZEYU ZHONG was born in 1990. He received the master's degree in electrical engineering from the Taiyuan University of Technology College. He is currently with State Grid Taiyuan Power Supply Company.  ... 
doi:10.1109/access.2019.2898349 fatcat:yh3axhqptzhfpnnkng4u4sghiu

Coverage-based Scene Fuzzing for Virtual Autonomous Driving Testing [article]

Zhisheng Hu, Shengjian Guo, Zhenyu Zhong, Kang Li
2021 arXiv   pre-print
Simulation-based virtual testing has become an essential step to ensure the safety of autonomous driving systems. Testers need to handcraft the virtual driving scenes and configure various environmental settings like surrounding traffic, weather conditions, etc. Due to the huge amount of configuration possibilities, the human efforts are subject to the inefficiency in detecting flaws in industry-class autonomous driving system. This paper proposes a coverage-driven fuzzing technique to
more » ... ally generate diverse configuration parameters to form new driving scenes. Experimental results show that our fuzzing method can significantly reduce the cost in deriving new risky scenes from the initial setup designed by testers. We expect automated fuzzing will become a common practice in virtual testing for autonomous driving systems.
arXiv:2106.00873v1 fatcat:dvms52rkavgxtnepslto35wsba

Genetics in Behcet's Disease: An Update Review

Yu Gao, Zhenyu Zhong, Peizeng Yang
2022 Frontiers in Ophthalmology  
Behcet's disease (BD) is one of the most vision-threatening clinical entities of uveitis. Although the etiopathogenesis of BD remains obscure, accumulating evidence has demonstrated that both genetic and environmental factors may contribute to the development of BD. Genome-wide association studies (GWAS) and candidate association studies have identified several genetic variants strongly associated with BD, including variants in human leukocyte antigen (HLA) -A02, -A03, -A24, -A26, -A31, -B15,
more » ... 27, -B35, -B49, -B51, -B57, -B58, -C0704, CIITA, ERAP1, MICA, IL1A-IL1B, IL10, IL12, IL23R, IL-23R/IL-12RB2, IL1RL1-IL18R1, STAT4, TFCP2L1, TRAF5, TNFAIP3, CCR1/CCR3, RIPK2, ADO-ZNF365-EGR2, KLRC4, LACC1, MEFV, IRF8, FUT2, CEBPB-PTPN1, ZMIZ1, RPS6KA4, IL10RA, SIPA1-FIBP-FOSL1, VAMP1, JRKL/CTCN5, IFNGR1 and miRNA-146a. Epigenetic modifications are also reported to play essential roles in the development of BD, including DNA methylation and histone modification. We review here the recent advances in the genetic and epigenetic factors associated with the BD pathogenesis.
doi:10.3389/fopht.2022.916887 fatcat:25q4rlpsyravnowomeghju43k4

Fast statistical spam filter by approximate classifications

Kang Li, Zhenyu Zhong
2006 Performance Evaluation Review  
Statistical-based Bayesian filters have become a popular and important defense against spam. However, despite their effectiveness, their greater processing overhead can prevent them from scaling well for enterprise-level mail servers. For example, the dictionary lookups that are characteristic of this approach are limited by the memory access rate, therefore relatively insensitive to increases in CPU speed. We address this scaling issue by proposing an acceleration technique that speeds up
more » ... ian filters based on approximate classification. The approximation uses two methods: hashbased lookup and lossy encoding. Lookup approximation is based on the popular Bloom filter data structure with an extension to support value retrieval. Lossy encoding is used to further compress the data structure. While both methods introduce additional errors to a strict Bayesian approach, we show how the errors can be both minimized and biased toward a false negative classification. We demonstrate a 6x speedup over two well-known spam filters (bogofilter and qsf) while achieving an identical false positive rate and similar false negative rate to the original filters.
doi:10.1145/1140103.1140317 fatcat:wlnbdnsxkzdefhytn3uudtzuzu

Towards Practical Lottery Ticket Hypothesis for Adversarial Training [article]

Bai Li, Shiqi Wang, Yunhan Jia, Yantao Lu, Zhenyu Zhong, Lawrence Carin, Suman Jana
2020 arXiv   pre-print
Recent research has proposed the lottery ticket hypothesis, suggesting that for a deep neural network, there exist trainable sub-networks performing equally or better than the original model with commensurate training steps. While this discovery is insightful, finding proper sub-networks requires iterative training and pruning. The high cost incurred limits the applications of the lottery ticket hypothesis. We show there exists a subset of the aforementioned sub-networks that converge
more » ... tly faster during the training process and thus can mitigate the cost issue. We conduct extensive experiments to show such sub-networks consistently exist across various model structures for a restrictive setting of hyperparameters (e.g., carefully selected learning rate, pruning ratio, and model capacity). As a practical application of our findings, we demonstrate that such sub-networks can help in cutting down the total time of adversarial training, a standard approach to improve robustness, by up to 49% on CIFAR-10 to achieve the state-of-the-art robustness.
arXiv:2003.05733v1 fatcat:zrzuwlgvmzfwxlspws34y5zhqq

Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction [article]

Yunhan Jia, Yantao Lu, Senem Velipasalar, Zhenyu Zhong, Tao Wei
2019 arXiv   pre-print
Neural networks are known to be vulnerable to carefully crafted adversarial examples, and these malicious samples often transfer, i.e., they maintain their effectiveness even against other models. With great efforts delved into the transferability of adversarial examples, surprisingly, less attention has been paid to its impact on real-world deep learning deployment. In this paper, we investigate the transferability of adversarial examples across a wide range of real-world computer vision
more » ... including image classification, explicit content detection, optical character recognition (OCR), and object detection. It represents the cybercriminal's situation where an ensemble of different detection mechanisms need to be evaded all at once. We propose practical attack that overcomes existing attacks' limitation of requiring task-specific loss functions by targeting on the 'dispersion' of internal feature map. We report evaluation on four different computer vision tasks provided by Google Cloud Vision APIs to show how our approach outperforms existing attacks by degrading performance of multiple CV tasks by a large margin with only modest perturbations.
arXiv:1905.03333v1 fatcat:hzg5agpi4fae7alxjbeqpr2eki

NF-κB: A Double-Edged Sword Controlling Inflammation

Danhui Liu, Zhenyu Zhong, Michael Karin
2022 Biomedicines  
Inflammation, when properly mounted and precisely calibrated, is a beneficial process that enables the rapid removal of invading pathogens and/or cellular corpses and promotes tissue repair/regeneration to restore homeostasis after injury. Being a paradigm of a rapid response transcription factor, the nuclear factor-kappa B (NF-κB) transcription factor family plays a central role in amplifying inflammation by inducing the expression of inflammatory cytokines and chemokines. Additionally, NF-κB
more » ... lso induces the expression of pro-survival and -proliferative genes responsible for promoting tissue repair and regeneration. Paradoxically, recent studies have suggested that the NF-κB pathway can also exert inhibitory effects on pro-inflammatory cytokine production to temper inflammation. Here, we review our current understanding about the pro- and anti-inflammatory roles of NF-κB and discuss the implication of its dichotomous inflammation-modulating activity in the context of inflammasome activation and tumorigenesis.
doi:10.3390/biomedicines10061250 pmid:35740272 pmcid:PMC9219609 fatcat:mgb4i5jl4vdpjd2pgy7f76mxoa

Screening of the Antigen Epitopes of Basic Fibroblast Growth Factor by Phage Display

Junjian Xiang, Zhenyu Zhong, Ning Deng, Zhendong Zhong, Hongyu Yang
2005 BMB Reports  
In order to investigate the epitope of basic fibroblast growth factor (bFGF) and its immunogenicity, the epitopes of bFGF were screened from the phage display library with monoclonal antibody GF22, which can neutralize the bio-activity of bFGF. By three rounds of screening, the positive phage clones with bFGF epitopes were selected, which can effectively block the bFGF to bind with GF22. Sequence analysis showed that the epitopes shared a highly conservative sequence
more » ... /Ile-Lys). The sequence of PPGHFK was located at 22-27 of the bFGF. The specific immuno-response of mouse could be highly induced by phage clones with the epitopes. And the anti-bFGF activity induced by LPGHFK was 3 times higher than the original sequence, which showed that the mimetic peptide LPLGHIK might be used as a tumor vaccine in the prevention and treatment of tumor.
doi:10.5483/bmbrep.2005.38.3.290 fatcat:463cjumv6nanjmt7frcmxwepq4

Speed Up Statistical Spam Filter by Approximation

Zhenyu Zhong, Kang Li
2011 IEEE transactions on computers  
Statistical-based Bayesian filters have become a popular and important defense against spam. However, despite their effectiveness, their greater processing overhead can prevent them from scaling well for enterprise level mail servers. For example, the dictionary lookups that are characteristic of this approach are limited by the memory access rate, therefore relatively insensitive to increases in CPU speed. We conduct a comprehensive study to address this scaling issue by proposing a series of
more » ... cceleration techniques that speed up Bayesian filters based on approximate classifications. The core approximation technique uses hash-based lookup and lossy encoding. Lookup approximation is based on the popular Bloom filter data structure with an extension to support value retrieval. Lossy encoding is used to further compress the data structure. While these approximation methods introduce additional errors to a strict Bayesian approach, we show how the errors can be both minimized and biased toward a false negative classification. We demonstrate a 6x speedup over two well-known spam filters (bogofilter and qsf) while achieving an identical false positive rate and similar false negative rate to the original filters.
doi:10.1109/tc.2010.92 fatcat:rnojyvcdjjeclmxyvwb5yhgace

Recycling Waste Classification Using Vision Transformer on Portable Device

Kai Huang, Huan Lei, Zeyu Jiao, Zhenyu Zhong
2021 Sustainability  
Recycling resources from waste can effectively alleviate the threat of global resource strain. Due to the wide variety of waste, relying on manual classification of waste and recycling recyclable resources would be costly and inefficient. In recent years, automatic recyclable waste classification based on convolutional neural network (CNN) has become the mainstream method of waste recycling. However, due to the receptive field limitation of the CNN, the accuracy of classification has reached a
more » ... ottleneck, which restricts the implementation of relevant methods and systems. In order to solve the above challenges, in this study, a deep neural network architecture only based on self-attention mechanism, named Vision Transformer, is proposed to improve the accuracy of automatic classification. Experimental results on TrashNet dataset show that the proposed method can achieve the highest accuracy of 96.98%, which is better than the existing CNN-based method. By deploying the well-trained model on the server and using a portable device to take pictures of waste in order to upload to the server, automatic waste classification can be expediently realized on the portable device, which broadens the scope of application of automatic waste classification and is of great significance with respect to resource conservation and recycling.
doi:10.3390/su132111572 fatcat:6tpg6dc4hvamhcje2viilxm5me

Simulation of Chinese Giant Solar Telescope

Zhong Liu, Zhenyu Jin, Torben Andersen, Anita Enmark
2011 Integrated Modeling of Complex Optomechanical Systems  
Chinese Giant Solar Telescope is the next generation ground based solar telescope of china. Due to the characteristics of ring aperture in polarization detection and thermal control, the current design of CGST is an 8 meter ring solar telescope. The simulation of science cases and the current observations from 1m class solar telescopes indicated the necessity of such a big aperture especially in infrared bands. The integrated simulation of optical system and imaging ability such as optical
more » ... n, MCAO, active maintenance of primary mirror were carried out in this paper. The results of simulation and analysis showed that the current design could meet the demand of most science cases not only in infrared band but also in near infrared band and visible band.
doi:10.1117/12.915792 fatcat:dayx6zn4mzdf7olwtrmq4dh33u

Soluble Form of Canine Transferrin Receptor Inhibits Canine Parvovirus InfectionIn VitroandIn Vivo

Jiexia Wen, Sumin Pan, Shuang Liang, Zhenyu Zhong, Ying He, Hongyu Lin, Wenyan Li, Liyue Wang, Xiujin Li, Fei Zhong
2013 BioMed Research International  
Canine parvovirus (CPV) disease is an acute, highly infectious disease threatening the dog-raising industry. So far there are no effective therapeutic strategies to control this disease. Although the canine transferrin receptor (TfR) was identified as a receptor for CPV infection, whether extracellular domain of TfR (called soluble TfR (sTfR)) possesses anti-CPV activities remains elusive. Here, we used the recombinant sTfR prepared from HEK293T cells with codon-optimized gene structure to
more » ... tigate its anti-CPV activity bothin vitroandin vivo. Our results indicated that codon optimization could significantly improve sTfR expression in HEK293T cells. The prepared recombinant sTfR possessed a binding activity to both CPV and CPV VP2 capsid proteins and significantly inhibited CPV infection of cultured feline F81 cells and decreased the mortality of CPV-infected dogs, which indicates that the sTfR has the anti-CPV activity bothin vitroandin vivo.
doi:10.1155/2013/172479 pmid:24089666 pmcid:PMC3780538 fatcat:nnbnbgpksve6jpw277bptmldqu

Electroplating Deposition of Bismuth Absorbers for X-ray Superconducting Transition Edge Sensors

Jian Chen, Jinjin Li, Xiaolong Xu, Zhenyu Wang, Siming Guo, Zheng Jiang, Huifang Gao, Qing Zhong, Yuan Zhong, Jiusun Zeng, Xueshen Wang
2021 Materials  
An absorber with a high absorbing efficiency is crucial for X-ray transition edge sensors (TESs) to realize high quantum efficiency and the best energy resolution. Semimetal Bismuth (Bi) has shown greater superiority than gold (Au) as the absorber due to the low specific heat capacity, which is two orders of magnitude smaller. The electroplating process of Bi films is investigated. The Bi grains show a polycrystalline rhombohedral structure, and the X-ray diffraction (XRD) patterns show a
more » ... l crystal orientation of (012). The average grain size becomes larger as the electroplating current density and the thickness increase, and the orientation of Bi grains changes as the temperature increases. The residual resistance ratio (RRR) (R300 K/R4.2 K) is 1.37 for the Bi film (862 nm) deposited with 9 mA/cm2 at 40 °C for 2 min. The absorptivity of the 5 μm thick Bi films is 40.3% and 30.7% for 10 keV and 15.6 keV X-ray radiation respectively, which shows that Bi films are a good candidate as the absorber of X-ray TESs.
doi:10.3390/ma14237169 pmid:34885323 fatcat:4s242h4fcbdm7jdun5nc65g3sm

Dynamical Scaling Properties of Electrons in Quantum Systems with Multifractal Eigenstates [article]

Jianxin Zhong, Zhenyu Zhang, Michael Schreiber, E. Ward Plummer, and Qian Niu
2000 arXiv   pre-print
We study the intricate relationships between the dynamical scaling properties of electron wave packets and the multifractality of the eigenstates in quantum systems. Numerical simulations for the Harper model and the Fibonacci chain indicate that the root mean square displacement displays the scaling behavior r(t)∼ t^β with β=D_2^ψ, where D_2^ψ is the correlation dimension of the multifractal eigenstates. The equality can be generalized to d-dimensional systems as β=D_2^ψ/d, as long as the
more » ... ron motion is ballistic in the effective D_2^ψ-dimensional space. This equality should be replaced by β<D_2^ψ/d if the motion is non-ballistic, as supported by all known results.
arXiv:cond-mat/0011118v1 fatcat:uti57l2ud5ewzcgv5vhxb445ce

Charged Vesicles Potently Induce NLRP3 Inflammasome Activation

Lixia Zhao, Li Xu, Zhenyu Zhong, Yougang Zhai, Liang Qiao, Renzhi Han
2015 Biophysical Journal  
Zhong 2 , Yougang Zhai 2 , Liang Qiao 2 , Renzhi Han 1 . 1 The OHIO STATE UNIVERSITY, Columbus, OH, USA, 2 Loyola University Chicago, Maywood, IL, USA.  ...  Further investigation will focus on the mechanisms of Ano5 and Ano6 in this regulatory process. 2128-Pos Board B265 Charged Vesicles Potently Induce NLRP3 Inflammasome Activation Lixia Zhao 1 , Li Xu 1 , Zhenyu  ... 
doi:10.1016/j.bpj.2014.11.2315 fatcat:t6j3twzk7fgszirew6yf4er23q
« Previous Showing results 1 — 15 out of 892 results